Search Results - (( developing theme classification algorithm ) OR ( java application among algorithm ))
Search alternatives:
- theme classification »
- application among »
- developing theme »
- java application »
- among algorithm »
-
1
-
2
-
3
Classification for Quran authentication using characters and diacritics hashed values
Published 2024journal::journal article -
4
Direct approach for mining association rules from structured XML data
Published 2012Get full text
Get full text
Thesis -
5
Evaluating the usability of a Quranic theme extraction and visualization system using task-based usability testing
Published 2025“…This study presents a task-based usability evaluation of a Quranic Theme Extraction and Visualization System, which integrates Natural Language Processing (NLP) techniques which are RAKE algorithm for keyword extraction and DistilBERT for theme classification. …”
Get full text
Get full text
Get full text
Article -
6
A Toolkit for Simulation of Desktop Grid Environment
Published 2014“…The prototypes will be developed using JAVA language united with a MySQL database. Core functionality of the simulator are job generation, volunteer generation, simulating algorithms, generating graphical charts and generating reports. …”
Get full text
Get full text
Final Year Project -
7
Group formation using genetic algorithm
Published 2009Get full text
Get full text
Get full text
Get full text
Monograph -
8
Network game (Literati) / Chung Mei Kuen
Published 2003“…The possible applications of multimedia-networked system are endless, as the demand to support interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
9
-
10
Attribute reduction based scheduling algorithm with enhanced hybrid genetic algorithm and particle swarm optimization for optimal device selection
Published 2022“…The simulation is implemented with iFogSim and java programming language. The proposed method can be applied in smart cities, monitoring, health delivery, augmented reality, and gaming among others.…”
Get full text
Get full text
Article -
11
-
12
Prediction of breast cancer diagnosis using machine learning in Malaysian women
Published 2024“…The three frequently used ML algorithms were deep learning, support vector machine (SVM), and cluster analysis. …”
Get full text
Get full text
Thesis -
13
Identification of Quran recitation segment from speech video recording / Liliana Nulkasim @ Mohd Kassim
Published 2017“…A random forest classifier algorithm is employed in Spyder IDE using python language as a machine learning language for predict the type of an audio. …”
Get full text
Get full text
Thesis -
14
Analyzing customer reviews for ARBA Travel using sentiment analysis
Published 2025“…Among these, Naive Bayes achieved the highest performance with an accuracy of 93.67% and an F1-score of 93.54%, making it the most effective model for sentiment classification in this context. The results were visualized using an interactive dashboard developed in Power BI, allowing users to explore sentiment trends, keyword frequency, and review distributions by gender, platform, and time. …”
Get full text
Get full text
Student Project -
15
Batch mode heuristic approaches for efficient task scheduling in grid computing system
Published 2016“…In ELB algorithm, the tasks are distributed among resources based on their execution time range. …”
Get full text
Get full text
Get full text
Thesis -
16
Network monopoly / Tan Kean Yeap
Published 2002“…The possible applications of multimedia-networked system are endless, as the demand to supoort interactive communication among groups of users has increased significantly. …”
Get full text
Get full text
Thesis -
17
-
18
Smart student timetable planner
Published 2025“…The system is implemented using Node.js with Express for server-side development, HTML, CSS, and JavaScript for the frontend, and Socket.IO for real-time collaboration. …”
Get full text
Get full text
Final Year Project / Dissertation / Thesis -
19
-
20
An approach to improve detecting and removing cross- site scripting vulnerabilities in web applications
Published 2015“…Cross-Site Scripting (XSS) vulnerabilities are among the most common and most serious security vulnerabilities in Web applications. …”
Get full text
Get full text
Thesis
